Wireless Security Essentials - Russell Dean Vines

Wireless Security Essentials

Defending Mobile Systems from Data Piracy
Buch | Softcover
368 Seiten
2002
John Wiley & Sons Inc (Verlag)
978-0-471-20936-2 (ISBN)
47,08 inkl. MwSt
  • Titel ist leider vergriffen;
    keine Neuauflage
  • Artikel merken
A guide to current wireless technologies and standards, security risks, available security measures, and vunerabilities that have yet to be addressed. Wireless device usage is increasing worldwide (by the year 2003, there will be 19 million mobile devices in use throughout the world) as is the potential for malicious code attacks.
As wireless device usage increases worldwide, so does the potential for malicious code attacks. In this timely book, a leading national authority on wireless security describes security risks inherent in current wireless technologies and standards, and schools readers in proven security measures they can take to minimize the chance of attacks to their systems. Russell Dean Vines is the coauthor of the bestselling security certification title, The CISSP Prep Guide (0-471-41356-9) Book focuses on identifying and minimizing vulnerabilities by implementing proven security methodologies, and provides readers with a solid working knowledge of wireless technology and Internet-connected mobile devices

RUSSELL DEAN VINES is founder and President of The RDV Group Inc., a New York City-based security consulting services firm. His company is active in detecting, preventing, and solving security vulnerabilities for clients in government, finance, and new media organizations. Vines is also a frequent speaker on security issues and coauthor of the bestselling book The CISSP Prep Guide: Mastering the Ten Domains of Computer Security (Wiley).

Preface. Introduction. Part I: Technology Essentials. Chapter 1: Computing Technology. Chapter 2: Wireless Theory. Chapter 3: Wireless Reality. Part II: Security Essentials. Chapter 4: Security Concepts and Methodologies. Chapter 5: Security Technologies. Chapter 6: Threats and Solutions. Appendix A: Glossary. Appendix B: A WLAN Exploitation Guide. Appendix C: Using the Fluhrer, Mantin, and Shamir Attack to Break WEP. Appendix D: NASA White Paper on the Wireless Firewall Gateway. Appendix E: Referenced Documents and URLs. Index.

Zusatzinfo maps
Verlagsort New York
Sprache englisch
Maße 191 x 235 mm
Gewicht 650 g
Einbandart Paperback
Themenwelt Mathematik / Informatik Informatik Netzwerke
Informatik Theorie / Studium Kryptologie
Technik Elektrotechnik / Energietechnik
ISBN-10 0-471-20936-8 / 0471209368
ISBN-13 978-0-471-20936-2 / 9780471209362
Zustand Neuware
Haben Sie eine Frage zum Produkt?
Mehr entdecken
aus dem Bereich